• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • SMB Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Social Networking

Facebook builds ThreatExchange security platform, with help from Twitter and Yahoo

API-based platform aims to give companies more control over the security threat data they share

Facebook's ThreatExchange is designed to let companies share data on cyber threats
  • Dan Worth
  • Dan Worth
  • @danworthV3
  • 12 February 2015
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

Facebook has announced a new security-sharing platform designed to help firms pass on information about incoming cyber attacks and threats. Twitter, Yahoo, Dropbox and Pinterest are already signed up to use the service.

ThreatExchange is an API-based platform that provides companies with the flexibility to specify the type and amount of information they share in order to strike a balance between openness and secrecy.

"Threats like malware and phishing typically go after multiple targets, and a successful attack at one place usually makes it easier to take over systems elsewhere. We share in each other’s fate," the website states.

"To be stronger together, we need a more open approach to security with the right tools. That’s how we can most effectively protect people’s accounts, safeguard data, and rid our services of spam and malware."

Mark Hammell, manager of the Threat Infrastructure team at Facebook, explained that Facebook took the lead in the project in the aftermath of a botnet that attacked several technology firms.

“A little over a year ago, a group of technology companies came together to discuss a botnet that was spreading a malware-based spam attack on all of our services,” he said.

“We quickly learned that sharing with one another was key to beating the botnet because parts of it were hosted on our respective services and none of us had the complete picture.

"During our discussions, it became clear that what we needed was a better model for threat sharing.”

Getting businesses to share information on security incidents has proved tough in the past as firms have been reluctant to reveal information that is considered sensitive.

Hammell said Facebook made sure that privacy controls on ThreatExchange were central to the platform to make it easy for partners to share only the data they felt comfortable releasing.

“Feedback from our early partners centred on the need for a consistent, reliable platform that could provide flexibility for organisations to be more open or selective about the information they share,” he said.

“As a result, we included a set of privacy controls so that participants can share only with the group or groups they wish.”

These early partners who provided feedback were Pinterest, Tumblr, Twitter and Yahoo. Bitly and Dropbox are also now signed up.

Other firms interested in becoming a partner can contact Facebook to get involved.

The project comes at the same time that the US government announced the creation of a new cyber security threat monitoring agency, the Cyber Threat Intelligence Integration Center, which has a similar goal of improving security preparedness.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Social Networking
  • Security
  • Facebook
  • Twitter
  • Yahoo

V3 Latest

AMD slams Nvidia for trying to impose 'gamer tax' on PC buyers
AMD slams Nvidia for trying to impose 'gamer tax' on PC buyers

But doesn't mention Nvidia by name...

  • Hardware
  • 18 April 2018
NHS criticised by Public Accounts Committee for learning nothing from WannaCry and NotPetya
NHS criticised by Public Accounts Committee for learning nothing from WannaCry and NotPetya

PAC slams lackadaisical NHS security as IT security measures are ignored

  • Security
  • 18 April 2018
Cloud costs are accelerating: here's how to keep them under control
Cloud costs are accelerating: here's how to keep them under control

Visibility, automation and accountability are essential

  • Cloud Computing
  • 18 April 2018
Machine learning technique can detect people's faces in the dark
Machine learning technique developed that can detect people's faces in the dark

Developed to enhance real-time biometrics for US Army's night-time operations

  • Gadgets
  • 18 April 2018
Back to Top

Most read

Machine learning technique can detect people's faces in the dark
Machine learning technique developed that can detect people's faces in the dark
Scientists uncover new battery chemical with 50 percent more storage capacity
Scientists uncover new battery chemical with 50 percent more storage capacity
AMD Ryzen CPU release dates, specs and price: X370 versus X470 AM4 motherboards
AMD Ryzen CPU release dates, specs and price: X370 versus X470 AM4 motherboards
AMD slams Nvidia for trying to impose 'gamer tax' on PC buyers
AMD slams Nvidia for trying to impose 'gamer tax' on PC buyers
NHS criticised by Public Accounts Committee for learning nothing from WannaCry and NotPetya
NHS criticised by Public Accounts Committee for learning nothing from WannaCry and NotPetya
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017